+

C++ vs. Python – Read Hakin9′s Step-by-step Tutorials and Become a Master!!

October 3, 2013


Magazine News NOTICE BOARD admin Comments Off

Hakin9_08_2013

Dear Readers,

We would like to introduce a new issue made by Hakin9. This time you will deal with C++ Code and Python. You will learn how to conduct an audit with using C++ Code analysis. You can compare it with offensive programming with python. For sure after reading our step-by-step tutorials you will become a professional auditor. You will get to know how to analyze source code to find vulnerabilities which will help you to protect your websites and applications.
This time you will find a reach section Extra with articles about Payment Cards, Hardware Hacking and Evidence Analysis.
We hope you will like it!

 

 

You can buy this issue or buy subscription and get access to all issues on our website.

[CLICK HERE]: CREATE FREE ACCOUNT (REGISTER NEEDED FOR BUY)
[CLICK HERE]: SUBSCRIBE (221,40 USD/YEAR)
[CLICK HERE]: LOG IN

This text is available for purchase but you need to login or register first.

You can buy this for 14.99 USD

Please register for free account or subscribe and get access to all issues on this website!

Inside:

Advanced C++ Code Analysis

C++ – Introduction To Code Analysis And Audit
By Bamidele Ajayi, OCP, MCTS, MCITP EA, CISA, CISM
As a security professional code analysis and auditing is an essential task to unravel flaws and vulnerabilities. Analysis and auditing also sheds more light into what the code is actually doing.This article introduces you to the basics you need to know before embarking on source code audit and analysis with emphasis on C++.

C++ Code Analysis
By Mohmmed AlAbbadi, CISSP, CCSP, Deliver Meticulous Information Security Consultancy & Management Analysis for Decision Support, IS Influencer
Have you ever wanted to have a superpower? What was yours? The ability to fly? Blow fire? Disappear? Stop time or even go back in time? Run faster? Or be bulletproof? Mine was always the ability to scan objects and see what others couldn’t see, the X-ray vision. Frankly, I wanted it for two reasons: one that was good and the other that was “wak”. The first was to help people by finding (and sometimes fixing) problems-yet-to-happen-in-the-future before their manifestation. For example, scan a car to find out that the brakes don’t work and tell the car owner before he/she drives it. The other reason was to find people’s vulnerabilities (like a knee injury) to defend myself if I got attacked or bullied.

Offensive Python

Offesive Python
By Kris Kaspersky, Reverse Engineering Expert, International Author
Python was created for fun, but evil hackers use it for profit. Why Python is a new threat for security industry and how tricky Lucifer’s kids are – let’s talk about it.

Extra

Having Fun With Antennas And Why You Need To Make Your Own
By Guillaume Puyo, Security researcher at EURA NOVA
Antennas (antennae for the serious people and entomologists) are the most omnipresent and the most misunderstood pieces of tech we all have, and yet, as everything keeps getting smaller and smaller they remain one of the few hacker friendly items we can tinker with. In these few pages, let’s have a first basic approach on how they work, learn what’s cool about them and get ready to build our own!

Payment Card Security
By Marios Andreou, Security Consultant
There are many standards ensuring minimum level of protection to sensitive information such as the Payment Card Industry Data Security Standard (PCI DSS) which protects the cardholder’s data (CHD), Data Protection Act, FSA regulations for financial information and ISO-27001 the information security Management standard. These standards are built to be more generic helping organisations deal with security risks and not to protect them from all security threats. Therefore, this article focuses on PCI DSS and what can be done and what approach must be followed by the experts to ensure security of information not just compliance with PCI DSS.

Evidence Analysis
By Mudit Sethia, Digital Evidence Analyst
Welcome back to the Novice approach to Evidence Analysis !! By putting the title to be one of being a novice, I really mean it to be novice – simple,straight and as it is . There can be no alteration done to the elementary alphabets ABCD … Agreed ?? [btw I know the other 22 alphabets as well ;) ]

Hacktivity 2013 Press Release

You can buy this issue or buy subscription and get access to all issues on our website.

[CLICK HERE]: CREATE FREE ACCOUNT (REGISTER NEEDED FOR BUY)
[CLICK HERE]: SUBSCRIBE (221,40 USD/YEAR)
[CLICK HERE]: LOG IN

This text is available for purchase but you need to login or register first.

You can buy this for 14.99 USD

Please register for free account or subscribe and get access to all issues on this website!

Comments

Tagged with:

Comments are closed.


IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa